1, May 2008 1, officially implemented in China-,the opening of government websites is considered as an important measure to promote government reform.
A. Summary of deepening government reform
B, government information disclosure regulations
C, the government's functional reform
D, strengthen the disclosure of government information
2. Online plagiarism disputes are frequently reflected.
First, the Internet industry lacks innovation vitality
B, the lack of Internet integrity
C, Internet market behavior needs to be standardized
D, the lag of Internet legislation
3. The common manifestations of cyber crime are illegal invasion, destruction of computer information system, online gambling, online theft and.
First, the criminal motives of online fraud
B. Cybercrime and Internet pornography
C, online pornography, high IQ
D, criminal motive, high IQ
4. The characteristics of network security technology are controllability, availability, integrity, confidentiality and security.
A. Diversity
B, complexity
C, operability
Undeniability
5. In the Internet environment, the formation of online public opinion has become more complicated, but generally it follows certain laws.
First, news information-the formation of public opinion
B, public opinion-news reports
C. Creating topics-topics continue to exist-forming online public opinion-developing online public opinion-calming online public opinion.
D, generate topics-form online public opinion-online public opinion subsided.
6. The following statement about the principle of reciprocity is incorrect.
A, the principle of reciprocity is one of the main principles of network morality.
B, network information exchange and network services are two-way.
C, the network subject only undertakes obligations.
D, the principle of reciprocity is essentially to give the network subject equality and justice.
7,201212 was passed in the National People's Congress Standing Committee (NPCSC) on February 28th, marking a new chapter in the legislation of network information protection.
A. decision on strengthening network information protection
B. Interim Measures for the Administration of Online Games
C. Measures for the Administration of Payment Services of Non-financial Institutions
D. Internet information management methods
8, the broad sense of network information security refers to
A. Encrypt information by using cryptographic technology to prevent information leakage and protect information from unauthorized users.
B, ensure that data is not illegally modified during transmission and storage.
C. adopt the generation and inspection technology of integrity identification to intercept and tamper with data.
D. Keep state secrets, or illegally disclose confidential information to unauthorized personnel without the permission of the information owner.
9, the most critical and weakest link in the field of information security is.
A. Technology
B. strategy
C, management system
D, people
10, network security generally refers to the hardware and software of the network system and its protection, which is not damaged, changed or leaked due to accidents or malicious reasons, and the system runs continuously and reliably without interrupting network services.
A, the file in the system
B, pictures in the system
C, data in the system
D, video in the system